Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 05:48
Static task
static1
Behavioral task
behavioral1
Sample
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe
Resource
win10v2004-20220812-en
General
-
Target
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe
-
Size
830KB
-
MD5
eb5fcfda27dd7dba6489e9235cb0ebb3
-
SHA1
214d444e61f2ce14eda1d8eb8d6cc46649e67f36
-
SHA256
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87
-
SHA512
0c03ec4898e15e6d8002477433620feb5f2ecf6f98614691c92f81c81922707b7589523c0b172854fa0bd3f47680b4219c18f04fc26a06ff529c77bcf276a172
-
SSDEEP
12288:MMN7mUCD1sJ86iVAClceomYDjPVnsOUErboVyj4Q/:z7mTWgVPl9ofDe0HPjj
Malware Config
Extracted
raccoon
1.7.1-hotfix
5eaa41b3101d5537f786a35da1878f0d1d760e53
-
url4cnc
https://telete.in/jbitchsucks
Signatures
-
Raccoon Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1300-140-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/1300-141-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/1300-142-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral2/memory/1300-143-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Suspicious use of SetThreadContext 1 IoCs
Processes:
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exedescription pid process target process PID 1904 set thread context of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exepid process 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exedescription pid process Token: SeDebugPrivilege 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exedescription pid process target process PID 1904 wrote to memory of 4872 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 4872 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 4872 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe PID 1904 wrote to memory of 1300 1904 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe 649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"C:\Users\Admin\AppData\Local\Temp\649982bca8732a94d5f1e9cc3d87045e3aff04687080036bed0ba298e7957e87.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1300-139-0x0000000000000000-mapping.dmp
-
memory/1300-140-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1300-141-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1300-142-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1300-143-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1904-132-0x0000000000250000-0x0000000000326000-memory.dmpFilesize
856KB
-
memory/1904-133-0x0000000005270000-0x0000000005814000-memory.dmpFilesize
5.6MB
-
memory/1904-134-0x0000000004D60000-0x0000000004DF2000-memory.dmpFilesize
584KB
-
memory/1904-135-0x0000000004CF0000-0x0000000004CFA000-memory.dmpFilesize
40KB
-
memory/1904-136-0x0000000007530000-0x00000000075A6000-memory.dmpFilesize
472KB
-
memory/1904-137-0x0000000007500000-0x000000000751E000-memory.dmpFilesize
120KB
-
memory/4872-138-0x0000000000000000-mapping.dmp